Authors :
Prinshu Sharma; Unmukh Datta
Volume/Issue :
Volume 9 - 2024, Issue 10 - October
Google Scholar :
https://tinyurl.com/36hfabrn
Scribd :
https://tinyurl.com/yuu4yf6d
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24OCT547
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
The importance of IoT security is growing as a
result of the growing number of IoT devices and their
many applications. Distributed denial of service (DDoS)
assaults on IoT systems have become more frequent,
sophisticated, and of a different kind, according to recent
research on network security, making DDoS one of the
most formidable dangers. Real, lucrative, and efficient
cybercrimes are carried out using DDoS attacks. One of
the most dangerous types of assaults in network security is
the DDoS attack. ML-based DDoS-detection systems
continue to face obstacles that negatively impact their
accuracy. AI, which incorporates ML to detect
cyberattacks, is the most often utilised approach for these
goals. In this study, it is suggested that DDoS assaults in
Software-Defined Networking be identified and countered
using ML approaches. The F1-score, recall, accuracy, and
precision of many ML techniques, including Cat Boost and
Extra Tree classifier, are compared in the suggested
model. DDoS-Net is designed to handle data imbalance
effectively and incorporates thorough feature analysis to
enhance the model's detection capabilities. Evaluation on
the UNSW-NB15 dataset demonstrates the exceptional
performance of DDoS-Net. The highest accuracy achieved
by the machine learning algorithms Cat Boost and Extra
Tree classifier is 90.78% and 90.27% respectively using the
most familiar dataset. This work presents a strong and
precise approach for DDoS attack detection, which greatly
improves the cybersecurity environment and strengthens
digital infrastructures against these ubiquitous threats.
Keywords :
Denial-of-Service (DoS), Attack, Classification, Identification, Machine Learning.
References :
- S. Kumar, P. Tiwari, and M. Zymbler, “Internet of Things is a revolutionary approach for future technology enhancement: a review,” J. Big Data, 2019, doi: 10.1186/s40537-019-0268-2.
- M. Snehi and A. Bhandari, “Vulnerability retrospection of security solutions for software-defined Cyber-Physical System against DDoS and IoT-DDoS attacks,” Computer Science Review. 2021. doi: 10.1016/j.cosrev.2021.100371.
- R. K. C. Chang, “Defending against flooding-based distributed denial-of-service attacks: A tutorial,” IEEE Commun. Mag., 2002, doi: 10.1109/MCOM.2002.1039856.
- B. Patel, V. K. Yarlagadda, N. Dhameliya, K. Mullangi, and S. C. R. Vennapusa, “Advancements in 5G Technology: Enhancing Connectivity and Performance in Communication Engineering,” Eng. Int., vol. 10, no. 2, pp. 117–130, 2022, doi: 10.18034/ei.v10i2.715.
- R. K. Gupta, K. K. Almuzaini, R. K. Pateriya, K. Shah, P. K. Shukla, and R. Akwafo, “An Improved Secure Key Generation Using Enhanced Identity-Based Encryption for Cloud Computing in Large-Scale 5G,” Wirel. Commun. Mob. Comput., 2022, doi: 10.1155/2022/7291250.
- V. Rohilla, S. Chakraborty, and M. Kaur, “An Empirical Framework for Recommendation-based Location Services Using Deep Learning,” Eng. Technol. Appl. Sci. Res., 2022, doi: 10.48084/etasr.5126.
- P. Khuphiran, P. Leelaprute, P. Uthayopas, K. Ichikawa, and W. Watanakeesuntorn, “Performance comparison of machine learning models for DDoS attacks detection,” in 2018 22nd International Computer Science and Engineering Conference, ICSEC 2018, 2018. doi: 10.1109/ICSEC.2018.8712757.
- Z. M. Jiyad, A. Al Maruf, M. M. Haque, M. Sen Gupta, A. Ahad, and Z. Aung, “DDoS Attack Classification Leveraging Data Balancing and Hyperparameter Tuning Approach Using Ensemble Machine Learning with XAI,” in 2024 Third International Conference on Power, Control and Computing Technologies (ICPC2T), 2024, pp. 569–575. doi: 10.1109/ICPC2T60072.2024.10475035.
- A. M. Al-Eryani, E. Hossny, and F. A. Omara, “Efficient Machine Learning Algorithms for DDoS Attack Detection,” in 2024 6th International Conference on Computing and Informatics (ICCI), 2024, pp. 174–181. doi: 10.1109/ICCI61671.2024.10485168.
- S. Kaur, A. K. Sandhu, and A. Bhandari, “Feature Extraction and Classification of Application Layer DDoS Attacks using Machine Learning Models,” in 2023 International Conference on Communication, Security and Artificial Intelligence, ICCSAI 2023, 2023. doi: 10.1109/ICCSAI59793.2023.10421652.
- P. S. Patil, S. L. Deshpande, G. S. Hukkeri, R. H. Goudar, and P. Siddarkar, “Prediction of DDoS Flooding Attack using Machine Learning Models,” in Proceedings of the 3rd International Conference on Smart Technologies in Computing, Electrical and Electronics, ICSTCEE 2022, 2022. doi: 10.1109/ICSTCEE56972.2022.10100083.
- S. Tufail, S. Batool, and A. I. Sarwat, “A Comparative Study Of Binary Class Logistic Regression and Shallow Neural Network For DDoS Attack Prediction,” in Conference Proceedings - IEEE SOUTHEASTCON, 2022. doi: 10.1109/SoutheastCon48659.2022.9764108.
- W. Yustanti, N. Iriawan, and Irhamah, “Categorical encoder based performance comparison in preprocessing imbalanced multiclass classification,” Indones. J. Electr. Eng. Comput. Sci., 2023, doi: 10.11591/ijeecs.v31.i3.pp1705-1715.
- V. Rohilla, S. Chakraborty, and R. Kumar, “Deep learning based feature extraction and a bidirectional hybrid optimized model for location based advertising,” Multimed. Tools Appl., vol. 81, no. 11, pp. 16067–16095, May 2022, doi: 10.1007/s11042-022-12457-3.
- R. C. Chen, C. Dewi, S. W. Huang, and R. E. Caraka, “Selecting critical features for data classification based on machine learning methods,” J. Big Data, 2020, doi: 10.1186/s40537-020-00327-4.
- A. Bhandari, “Feature Engineering: Scaling, Normalization and Standardization,” Analytics Vidhya.
- P. Geurts, D. Ernst, and L. Wehenkel, “Extremely randomized trees,” Mach. Learn., vol. 63, no. 1, pp. 3–42, 2006, doi: 10.1007/s10994-006-6226-1.
- V. John, Z. Liu, C. Guo, S. Mita, and K. Kidono, “Real-time lane estimation Using Deep features and extra trees regression,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016. doi: 10.1007/978-3-319-29451-3_57.
- G. Mishra, D. Sehgal, and J. K. Valadi, “Quantitative Structure Activity Relationship study of the Anti-Hepatitis Peptides employing Random Forest and Extra Tree regressors,” Bioinformation, 2017, doi: 10.6026/97320630013060.
- A. V. Dorogush, V. Ershov, and A. Gulin, “CatBoost: gradient boosting with categorical features support,” pp. 1–7, 2018.
- L. Prokhorenkova, G. Gusev, A. Vorobev, A. V. Dorogush, and A. Gulin, “Catboost: Unbiased boosting with categorical features,” in Advances in Neural Information Processing Systems, 2018.
- H. Liu, L. Guo, H. Li, W. Zhang, and X. Bai, “Matching Areal Entities with CatBoost Ensemble Method,” J. Geo-Information Sci., 2022, doi: 10.12082/dqxxkx.2022.220050.
The importance of IoT security is growing as a
result of the growing number of IoT devices and their
many applications. Distributed denial of service (DDoS)
assaults on IoT systems have become more frequent,
sophisticated, and of a different kind, according to recent
research on network security, making DDoS one of the
most formidable dangers. Real, lucrative, and efficient
cybercrimes are carried out using DDoS attacks. One of
the most dangerous types of assaults in network security is
the DDoS attack. ML-based DDoS-detection systems
continue to face obstacles that negatively impact their
accuracy. AI, which incorporates ML to detect
cyberattacks, is the most often utilised approach for these
goals. In this study, it is suggested that DDoS assaults in
Software-Defined Networking be identified and countered
using ML approaches. The F1-score, recall, accuracy, and
precision of many ML techniques, including Cat Boost and
Extra Tree classifier, are compared in the suggested
model. DDoS-Net is designed to handle data imbalance
effectively and incorporates thorough feature analysis to
enhance the model's detection capabilities. Evaluation on
the UNSW-NB15 dataset demonstrates the exceptional
performance of DDoS-Net. The highest accuracy achieved
by the machine learning algorithms Cat Boost and Extra
Tree classifier is 90.78% and 90.27% respectively using the
most familiar dataset. This work presents a strong and
precise approach for DDoS attack detection, which greatly
improves the cybersecurity environment and strengthens
digital infrastructures against these ubiquitous threats.
Keywords :
Denial-of-Service (DoS), Attack, Classification, Identification, Machine Learning.